EzCME
CrackMapExec output processor for streamlined post-exploitation analysis and reporting.
Overview
EzCME processes CrackMapExec output into structured, actionable reports. It parses raw CME output and generates organized summaries for penetration testing engagements.
Features
- Parse CrackMapExec JSON and text output
- Generate structured reports with credential mapping
- Filter results by host, service, or credential status
- Export to multiple formats
Usage
$ python ezcme.py -i cme_output.json -o report.html[*] Parsing 142 entries...[+] Report generated: report.html